為了使本領域技術人員更好地理解本說明書實施例中的技術方案,下面將結合本說明書實施例中的圖式,對本說明書實施例中的技術方案進行詳細地描述,顯然,所描述的實施例僅僅是本說明書的一部分實施例,而不是全部的實施例。基於本說明書中的實施例,本領域普通技術人員所獲得的所有其他實施例,都應當屬於保護的範圍。
在當前,著作權的保護範圍中包括文字作品,這其中的文字作品是指以語言文字的形式,或其他相當於語言文字的符號來表達作者感情、思想的作品。在現實中,隨著網路的發展,很多原創性的短語或者短句可以在短時間內被創造出來並廣泛傳播,這種原創性的短語或者短句一方面很難得到著作權的保護,另一方面由於網路的快速傳播,很快就難以證明誰是原創者。而公眾往往只會使用該短語,也並不關心原創者是誰,這對於原創者來說,已經損失了一部分利益。
基於此,本說明書實施例提供一種基於區塊鏈的對於著作權之外的原創作品的保護方案,透過使用者發佈交易,節點對原創文字進行獨創性驗證並上鏈存證,實現對於原創作品的原創性存證。
以下結合圖式,詳細說明本說明書各實施例提供的技術方案。如圖1所示,圖1是本說明書實施例提供的一種基於區塊鏈的作品存證方法的流程示意圖,該流程具體包括如下步驟:
S101,用戶端發送目標交易至節點,所述目標交易中包含原創文字和所述原創文字相關的備註資訊,所述原創文字為不超過預設長度的短語或者短句,所述備註資訊中包含有使用者標識和所述原創文字的語義資訊。
在本說明書中所描述的交易(transaction),是指使用者透過區塊鏈的用戶端創建,並需要最終發佈至區塊鏈的分散式資料庫中的一筆資料。也就是說,區塊鏈中的交易,存在狹義的交易以及廣義的交易之分。狹義的交易是指使用者向區塊鏈發佈的一筆價值轉移;例如,在傳統的比特幣區塊鏈網路中,交易可以是使用者在區塊鏈中發起的一筆轉帳。而廣義的交易是指使用者向區塊鏈發佈的一筆具有業務意圖的業務資料;例如,營運方可以基於實際的業務需求搭建一個聯盟鏈,依託於聯盟鏈部署一些與價值轉移無關的其它類型的在線業務(比如,租房業務、車輛調度業務、保險理賠業務、信用服務、醫療服務等),而在這類聯盟鏈中,交易可以是使用者在聯盟鏈中發佈的一筆具有業務意圖的業務消息或者業務請求。
一種可實施的方式為,在用戶端中提供用於使用者輸入的介面,介面中包含有兩個對話方塊,一個框輸入原創文字,例如發佈新成語,另一個框可以輸入一些關於該原創本文的備註資訊,如作者、創作背景、故事性、語義資訊等等。由用戶端產生包含原創文字和備註資訊的交易發佈至節點。原創文字可以是短語或者短句。
在本說明書實施例中,短語可以是各種形式的字串。例如,可以是只包括一種自然語言的單詞構成的片語,所述的自然語言包括中文、英文、日語、韓語等等,例如,“喜大普奔”。也可以是多種自然語言的單詞構成的片語,例如,“打call”。還可以是由原創作者發明的一個新的詞彙或者字串,例如,“skr”,等等。
換言之,短語本身是包含有一定的語義資訊的,但是這種語義資訊通常被壓縮或者隱藏,不是以明顯的方式顯示出來。因此,需要在備註資訊中進行闡述,解釋該短語的含義。如果一個短語不能包含有任何語義,顯然,它也就沒有傳播的價值,因此在備註資訊中對上述短語進行語義解釋是必要的。在備註資訊中,除了對於短語的語義解釋以外,還可以包括使用者標識。在本說明書實施例中,所述使用者標識可以包括使用者姓名、代號、暱稱等等。此外,備註資訊中還可以包括對於短語的背景解釋,例如,創作動機、創作背景、創作過程等等。
短句一般而言,本身是有確切的語義的。例如,對於一個短句“我去做頭髮了”本身而言,其意義是明顯的。但是,顯然對於一個已經有明顯確切名義的短句而言,其已經是在某些場景下被經常使用了。因此,該短句必須還帶有其它的語義資訊,才使得該短句能夠被使用在與前述常用場景無關的其它場景下,此時該短句才具有了原創性。換言之,與前述的短句類似,在備註資訊中也對短語進行語義解釋也是必要的。同樣的,為保護原創者的署名權利,在備註資訊中還應該包括使用者標識。此外,在備註資訊中還可以包括其它一些解釋性的資訊。
在本說明書實施例中,一般對於短語或者短句而言,不應超過預設長度。例如,所述的預設長度為“20個位元組”。過長的原創文字可能已經成為了小說、詩歌等等文學作品,並進入了著作權的保護範圍,在那種情形下,過長的文字不適合由本說明書實施例的方案進行獨創性驗證,也不適合透過本說明書實施例所提供的方式進行存證。
此外,在用戶端構建目標交易時,還可以透過使用者設備獲取使用者透過時間模組獲取當前的時間戳記。並在構建目標交易時,加入上述時間戳記,進一步起到輔助存證的作用。
S103,所述節點接收所述目標交易,對所述原創文字進行獨創性驗證。
獨創性驗證包括兩個方面,即形式上的獨創性驗證和語義上的獨創性驗證。如果一個原創文字從形式上是原創的,以及它具有確切的語義。那麼,可以認為該原創文字是具有原創性的。例如,對於一個短語“喜大普奔”而言,在一個時間點之前,其本身並不存在相同形式的詞語,而同時備註資訊中給出其本身的確切的語義為“喜聞樂見、大快人心、普天同慶、奔相走告”。那麼此時,節點可以認為此時的短語“喜大普奔”具有獨創性。
另一方面,如果一個原創文字從形式上並不是原創的,而是已經存在的。那麼,此時就需要對該原創文字的語義進行進一步的驗證,如果語義上是原創的,與之前的常規語義並不相同,則可以認為該原創文字是原創的。
S105,若驗證通過,所述節點將所述目標交易廣播至區塊鏈網路,以使所述區塊鏈網路中的各節點基於共識機制對所述目標交易進行共識處理,並在共識通過後將所述目標交易發佈至區塊鏈。
由於原創文字和包含使用者標識的備註資訊被捆綁式的進行了區塊鏈存證,難以被篡改,從而可以作為該使用者原創作者的證據。區塊鏈網路中的各節點基於共識機制對所述目標交易進行共識處理,並在共識通過後將所述目標交易發佈至確權區塊鏈之後,此時可以返回一個存證雜湊給使用者,使用者可以透過存證雜湊對區塊鏈進行查詢,以進行原創身份的確認。
本說明書實施例所提供的方案,透過使用者發佈包括原創文字和備註資訊的交易,而區塊鏈對於上述原創文字進行獨創性驗證之後,如果驗證通過,則確定了該原創文字的獨創性,進而將包含該原創文字的交易進行區塊鏈的共識與存證,實現對於那些著作權無法保護的原創作品的存證,保護了原創作者的利益。
在一種具體的實施方式下,對於步驟S103,對所述原創文字進行獨創性驗證,在節點中已經包含有較多的交易內容時,可以基於區塊鏈中已經存證的內容進行獨創性驗證。對於區塊鏈中各節點而言,其本身可以在交易完成共識之後(即,已經確定交易要上鏈),就將各交易內容(包括原創文字和備註資訊)進行儲存。因此,可以基於上述已經上鏈的交易內容中的原創文字,以及,一些常規的詞典(例如,古今漢語詞典)構建用於獨創性驗證的可以更新的資料庫,用於對原創文字進行驗證,如果原創文字形式上滿足原創(即資料庫中不存在完全相同的文字),且具有確切的語義,則獨創性驗證通過。
在一種具體的實施方式下,由於原創文字經常來自於網路創作,因此還可以對原創文字進行公開搜尋,具體包括:從廣域網路中搜尋所述原創文字,獲取與所述原創文字相關的公開搜尋內容;將所述原創文字與所述公開搜尋內容進行連續匹配,確定所述公開搜尋內容中的字串與所述原創文字的連續匹配程度;若所述連續匹配程度小於匹配度臨界值,則驗證通過。
具體而言,可以從廣域網路的中對原創文字進行相應的搜尋。例如,使用搜尋引擎對原創文字進行搜尋,得到和原創文字相應的多條內容片段。由於所述原創文字可以視為一個字串,搜尋引擎也是以原創文字所對應的字串進行相應的搜尋。在公開搜尋內容得不到相同字串時,即沒有連續匹配程度達到100%的字串時,驗證通過。
在使用公開搜尋引擎進行搜尋是,還可以根據交易中所攜帶的時間戳記進行搜尋。在交易中所攜帶的時間戳記為時間點A時,則搜尋得到的公開內容均應在時間點A之前,而不應包含有時間點A之後的相關內容。例如,可以透過搜尋引擎所提供的時間選項進行內容過濾,以時間點A為截止點進行內容搜尋。
在本說明書實施例中,由於原創文字的長度較短,搜尋引擎在得不到相同的字串時,也往往可以得到相似字串。相似的字串也往往是和相同的字串有著一定的相關性的。此時,還可以設定一定的臨界值條件進行判斷,計算相似字串與原創文字的字串的連續匹配程度,小於一定的預設臨界值,則驗證通過。連續匹配程度表徵了兩個字串的相似程度,這種相似程度包含了字元相似程度和字元順序的相似程度,對於短語而言,當二者高度接近時,一般認為二者就是表徵了相同的含義,當連續匹配程度小於匹配度臨界值,則可以認為二者語義有了明顯的區別,此時驗證通過。
在搜尋引擎得到的內容片段中包含有與原創文字相似字串的情形下,此時,還可以進一步的對相似字串進行語義分析。具體而言,可以首先確定包含了相似字串的公開搜尋內容,一般而言,公開搜尋內容即為包含了相同或者相似字串的一句文字,或者一段文字。公開搜尋內容可以是透過搜尋的鏈接所得到的全文文字,也可以是搜尋得到的部分文字片段,還可以是一些快照文字等等。如圖2所示,圖2為當前技術中公開搜尋內容的相關示意圖。在該示意圖中,原創文字用自字串“XXXX”做了替代,搜尋得到的相同字串即為“XXXX”,相似字串即為“XXXY”、“XXYX”等等,在搜尋引擎中直接給出的結果一般為包含相同或者相似字串的部分文字片段,示意圖中的鏈接均用省略號進行了替代。
進而,可以根據公開搜尋內容以及上下文對相似字串進行語義分析。一般而言,上下文的範圍無需太廣,細微性和公開搜尋內容一致即可。即,當公開搜尋內容為一句文字時,上下文即為前後各一句文字,當公開搜尋內容為一段話時,上下文即為前後各一段文字。從而得到相似字串的第二語義。對於原創文字的第一語義,可以從備註資訊中分析得到。進而可以對第二語義和第一語義進行的相似度進行比較,顯然,當二者形式已經很相似的情形下,若二者的語義還很相似,則顯然不是原創的,在這種情形下,一般會要求二者的語義相似度較低,並設定一個較小的相似度臨界值,當二者的語義相似度小於語義相似度臨界值(例如,5%),則驗證通過。
進一步地,語義相似度臨界值可以是和二者的連續匹配程度負相關的。在相似字串與原創文字的連續匹配程度越大時,語義相似度臨界值則應該越小。例如,語義相似度臨界值=1-連續匹配程度。當二者形式完全相同時,則需要原創文字中該字串的語義與公開搜尋內容中該字串的語義完全不同,才能通過驗證。
進一步地,在區塊鏈網路中的各節點基於共識機制對所述目標交易進行共識處理之後,各節點還可以對目標一交易中所包含的內容進行儲存。具體的儲存方式可以是各節點以所述原創文字為主鍵,所述備註資訊為值,建立原創文字和備註資訊的鍵值對應關係,並儲存所述鍵值對應關係至本地預先維護的資料庫。在這種方式下,一方面,可以根據上述資料庫對後續的原創文字進行驗證,避免需要驗證時從區塊鏈中再去獲取交易內容;另一方面,可以有利於第三方進行相應的查詢,從而可以方便的獲知一個原創文字的創作背景以及原創作者等等資訊。
在本說明書實施例的第二態樣,還提供一種節點方面的基於區塊鏈的作品存證方法,如圖3所示,圖3為本說明書實施例所提供的節點方面的基於區塊鏈的作品存證方法的流程示意圖,包括:
S301,接收目標交易,其中,所述目標交易中包含原創文字和所述原創文字相關的備註資訊,所述原創文字為不超過預設長度的短語或者短句,所述備註資訊中包含有使用者標識和所述原創文字的語義資訊;
S303,對所述原創文字進行獨創性驗證;
S305,若驗證通過,所述節點將所述目標交易廣播至區塊鏈網路,以使所述區塊鏈網路中的各節點基於共識機制對所述目標交易進行共識處理,並在共識通過後將所述目標交易發佈至區塊鏈。
進一步地,對於步驟S303中的,對所述原創文字進行獨創性驗證,包括:從所述區塊鏈中獲取已經被存證的交易內容,根據所述已存證的交易內容對所述原創文字進行獨創性驗證。
進一步地,對於步驟S303中的,對所述原創文字進行獨創性驗證,包括:
從廣域網路中搜尋所述原創文字,獲取與所述原創文字相關的公開搜尋內容;將所述原創文字與所述公開搜尋內容進行連續匹配,確定所述公開搜尋內容中的字串與所述原創文字的連續匹配程度;若所述連續匹配程度小於匹配度臨界值,則驗證通過。
更進一步地,對於步驟S303中的,對所述原創文字進行獨創性驗證,包括:從所述備註資訊中,確定所述原創文字的第一語義;確定連續匹配程度超過匹配度臨界值的相似字串;從包含所述相似字串的公開搜尋內容中,確定所述相似字串的第二語義;若第一語義與第二語義的相似度小於語義相似度臨界值,則驗證通過。
進一步地,在基於共識機制對所述目標交易進行共識處理之後,所述方法還包括:以所述原創文字為主鍵,所述備註資訊為值,建立原創文字和備註資訊的鍵值對應關係,並儲存所述鍵值對應關係。
與第一態樣對應的,本說明書實施例還提供一種基於區塊鏈的作品存證系統,包括:
用戶端發送目標交易至節點,所述目標交易中包含原創文字和所述原創文字相關的備註資訊,所述原創文字為不超過預設長度的短語或者短句,所述備註資訊中包含有使用者標識和所述原創文字的語義資訊;
所述節點接收所述目標交易,對所述原創文字進行獨創性驗證;
若驗證通過,所述節點將所述目標交易廣播至區塊鏈網路,以使所述區塊鏈網路中的各節點基於共識機制對所述目標交易進行共識處理,並在共識通過後將所述目標交易發佈至區塊鏈。
與第二態樣對應的,本說明書實施例還提供一種基於區塊鏈的作品存證裝置,如圖4所示,圖4為本說明書實施例提供的一種基於區塊鏈的作品存證裝置的結構示意圖,包括:
接收模組401,接收目標交易,其中,所述目標交易中包含原創文字和所述原創文字相關的備註資訊,所述原創文字為不超過預設長度的短語或者短句,所述備註資訊中包含有使用者標識和所述原創文字的語義資訊;
驗證模組403,對所述原創文字進行獨創性驗證;
廣播模組405,若驗證通過,所述節點將所述目標交易廣播至區塊鏈網路,以使所述區塊鏈網路中的各節點基於共識機制對所述目標交易進行共識處理,並在共識通過後將所述目標交易發佈至區塊鏈。
進一步地,所述驗證模組403,從所述區塊鏈中獲取已經被存證的交易內容,根據所述已存證的交易內容對所述原創文字進行獨創性驗證。
進一步地,所述驗證模組403,從廣域網路中搜尋所述原創文字,獲取與所述原創文字相關的公開搜尋內容;將所述原創文字與所述公開搜尋內容進行連續匹配,確定所述公開搜尋內容中的字串與所述原創文字的連續匹配程度;若所述連續匹配程度小於匹配度臨界值,則驗證通過。
更進一步地,所述驗證模組403,從所述備註資訊中,確定所述原創文字的第一語義;確定連續匹配程度超過匹配度臨界值的相似字串;從包含所述相似字串的公開搜尋內容中,確定所述相似字串的第二語義;若第一語義與第二語義的相似度小於語義相似度臨界值,則驗證通過。
進一步地,所述裝置還包括儲存模組407,以所述原創文字為主鍵,所述備註資訊為值,建立原創文字和備註資訊的鍵值對應關係,並儲存所述鍵值對應關係。
本說明書實施例還提供一種電腦設備,其至少包括記憶體、處理器及儲存在記憶體上並可在處理器上運行的電腦程式,其中,處理器執行所述程式時實現圖3所示的基於區塊鏈的作品存證方法。
圖5示出了本說明書實施例所提供的一種更為具體的計算設備硬體結構示意圖,該設備可以包括:處理器1010、記憶體1020、輸入/輸出介面1030、通信介面1040和匯流排1050。其中處理器1010、記憶體1020、輸入/輸出介面1030和通信介面1040透過匯流排1050實現彼此之間在設備內部的通信連接。
處理器1010可以採用通用的CPU(Central Processing Unit,中央處理器)、微處理器、應用專用積體電路(Application Specific Integrated Circuit,ASIC)、或者一個或多個積體電路等方式實現,用於執行相關程式,以實現本說明書實施例所提供的技術方案。
記憶體1020可以採用ROM(Read Only Memory,唯讀記憶體)、RAM(Random Access Memory,隨機存取記憶體)、靜態儲存設備,動態儲存裝置設備等形式實現。記憶體1020可以儲存作業系統和其他應用程式,在透過軟體或者韌體來實現本說明書實施例所提供的技術方案時,相關的程式碼保存在記憶體1020中,並由處理器1010來呼叫執行。
輸入/輸出介面1030用於連接輸入/輸出模組,以實現資訊輸入及輸出。輸入輸出/模組可以作為組件配置在設備中(圖中未示出),也可以外接於設備以提供相應功能。其中輸入裝置可以包括鍵盤、滑鼠、觸控式螢幕、麥克風、各類感測器等,輸出設備可以包括顯示器、揚聲器、振動器、指示燈等。
通信介面1040用於連接通信模組(圖中未示出),以實現本設備與其他設備的通信互動。其中通信模組可以透過有線方式(例如USB、電纜等)實現通信,也可以透過無線方式(例如行動網路、WIFI、藍牙等)實現通信。
匯流排1050包括一通路,在設備的各個組件(例如處理器1010、記憶體1020、輸入/輸出介面1030和通信介面1040)之間傳輸資訊。
需要說明的是,儘管上述設備僅示出了處理器1010、記憶體1020、輸入/輸出介面1030、通信介面1040以及匯流排1050,但是在具體實施過程中,該設備還可以包括實現正常運行所必需的其他組件。此外,本領域的技術人員可以理解的是,上述設備中也可以僅包含實現本說明書實施例方案所必需的組件,而不必包含圖中所示的全部組件。
本說明書實施例還提供一種電腦可讀儲存媒體,其上儲存有電腦程式,該程式被處理器執行時實現圖3所示的基於區塊鏈的作品存證方法。
電腦可讀媒體包括永久性和非永久性、行動抽取式和非行動抽取式媒體可以由任何方法或技術來實現資訊儲存。資訊可以是電腦可讀指令、資料結構、程式的模組或其他資料。電腦的儲存媒體的例子包括,但不限於相變記憶體(PRAM)、靜態隨機存取記憶體(SRAM)、動態隨機存取記憶體(DRAM)、其他類型的隨機存取記憶體(RAM)、唯讀記憶體(ROM)、電可抹除可程式唯讀記憶體(EEPROM)、快閃記憶體或其他內部記憶體技術、唯讀光碟唯讀記憶體(CD-ROM)、數位多功能光碟(DVD)或其他光學儲存器、磁盒式磁帶,磁帶式磁碟儲存器或其他磁性儲存設備或任何其他非傳輸媒體,可用於儲存可以被計算設備存取的資訊。按照本文中的界定,電腦可讀媒體不包括暫態媒體(transitory media),如調變的資料訊號和載波。
透過以上的實施方式的描述可知,本領域的技術人員可以清楚地瞭解到本說明書實施例可借助軟體加必需的通用硬體平台的方式來實現。基於這樣的理解,本說明書實施例的技術方案本質上或者說對現有技術做出貢獻的部分可以以軟體產品的形式體現出來,該電腦軟體產品可以儲存在儲存媒體中,如ROM/RAM、磁碟、光碟等,包括若干指令用以使得一台電腦設備(可以是個人電腦,伺服器,或者網路設備等)執行本說明書實施例各個實施例或者實施例的某些部分所述的方法。
上述實施例闡明的系統、方法、模組或單元,具體可以由電腦晶片或實體實現,或者由具有某種功能的產品來實現。一種典型的實現設備為電腦,電腦的具體形式可以是個人電腦、膝上型電腦、蜂巢式電話、相機電話、智慧型電話、個人數位助理、媒體播放器、導航設備、電子郵件收發設備、遊戲主機、平板電腦、可穿戴設備或者這些設備中的任意幾種設備的組合。
本說明書中的各個實施例均採用遞進的方式描述,各個實施例之間相同相似的部分互相參見即可,每個實施例重點說明的都是與其他實施例的不同之處。尤其,對於方法實施例而言,由於其基本相似於方法實施例,所以描述得比較簡單,相關之處參見方法實施例的部分說明即可。以上所描述的方法實施例僅僅是示意性的,其中所述作為分離部件說明的模組可以是或者也可以不是實體上分開的,在實施本說明書實施例方案時可以把各模組的功能在同一個或多個軟體及/或硬體中實現。也可以根據實際的需要選擇其中的部分或者全部模組來實現本實施例方案的目的。本領域普通技術人員在不付出創造性勞動的情況下,即可以理解並實施。
以上所述僅是本說明書實施例的具體實施方式,應當指出,對於本技術領域的普通技術人員來說,在不脫離本說明書實施例原理的前提下,還可以做出若干改進和潤飾,這些改進和潤飾也應視為本說明書實施例的保護範圍。
In order to enable those skilled in the art to better understand the technical solutions in the embodiments of this specification, the technical solutions in the embodiments of this specification will be described in detail below in conjunction with the drawings in the embodiments of this specification. Obviously, the described implementation The examples are only a part of the embodiments of this specification, not all the embodiments. Based on the embodiments in this specification, all other embodiments obtained by a person of ordinary skill in the art should fall within the scope of protection.
At present, the scope of copyright protection includes written works. The written works refer to works that express the author’s feelings and thoughts in the form of language or other symbols equivalent to language. In reality, with the development of the Internet, many original phrases or short sentences can be created in a short time and spread widely. On the one hand, it is difficult for such original phrases or short sentences to be protected by copyright. On the other hand, due to the rapid spread of the Internet, it is soon difficult to prove who the original creator is. The public often only uses this phrase and does not care who the original creator is. For the original creator, some of the benefits have been lost.
Based on this, the embodiments of this specification provide a blockchain-based protection scheme for original works other than copyright. Through user release transactions, nodes perform originality verification of the original text and upload the certificate on the chain to realize the protection of original works. Original evidence.
The following describes in detail the technical solutions provided by the embodiments of this specification in conjunction with the drawings. As shown in Fig. 1, Fig. 1 is a schematic flow diagram of a method for depositing works based on blockchain according to an embodiment of this specification. The flow specifically includes the following steps:
S101: The client sends a target transaction to a node, the target transaction contains original text and remarks information related to the original text, the original text is a phrase or short sentence not exceeding a preset length, and the remark information includes Contains user identification and semantic information of the original text.
The transaction described in this manual refers to a piece of data that is created by the user through the client of the blockchain and needs to be finally published to the distributed database of the blockchain. In other words, transactions in the blockchain are divided into narrow transactions and broad transactions. A transaction in a narrow sense refers to a transfer of value issued by a user to the blockchain; for example, in a traditional Bitcoin blockchain network, a transaction can be a transfer initiated by the user in the blockchain. In a broad sense, a transaction refers to a piece of business data with business intentions released by a user to the blockchain; for example, an operator can build a consortium chain based on actual business needs, and rely on the consortium chain to deploy some other types that are not related to value transfer Online business (for example, renting business, vehicle scheduling business, insurance claims business, credit service, medical service, etc.), and in this kind of alliance chain, the transaction can be a business with business intent issued by the user in the alliance chain Message or business request.
An practicable way is to provide an interface for user input in the user terminal. The interface contains two dialog boxes, one box for inputting original text, such as publishing a new idiom, and the other box for entering something about the original text Remarks information, such as author, creative background, story, semantic information, etc. A transaction containing original text and remarks generated by the client is posted to the node. The original text can be a phrase or a short sentence.
In the embodiments of this specification, the phrase can be a string of various forms. For example, it may be a phrase composed of words in only one natural language, and the natural language includes Chinese, English, Japanese, Korean, etc., for example, "Xida Pu Ben". It can also be a phrase composed of words in multiple natural languages, for example, "Call". It can also be a new word or string invented by the original author, for example, "skr", etc.
In other words, the phrase itself contains certain semantic information, but this semantic information is usually compressed or hidden, and is not displayed in an obvious way. Therefore, it is necessary to elaborate in the remarks to explain the meaning of the phrase. If a phrase cannot contain any semantics, obviously, it has no communication value. Therefore, it is necessary to explain the above phrases in the remarks. In addition to the semantic interpretation of the phrase, the remark information can also include user identification. In the embodiment of this specification, the user identification may include the user's name, code, nickname, and so on. In addition, the remark information may also include background explanations for the phrase, for example, creative motivation, creative background, creative process, and so on.
Generally speaking, short sentences have exact semantics. For example, for a short sentence "I'm going to do my hair" itself, its meaning is obvious. However, it is obvious that for a short sentence that has a clear and precise name, it has been used frequently in certain scenarios. Therefore, the short sentence must also carry other semantic information, so that the short sentence can be used in other scenarios that have nothing to do with the aforementioned common scenarios. At this time, the short sentence has originality. In other words, similar to the aforementioned short sentences, it is also necessary to interpret the phrases in the remarks. Similarly, in order to protect the author’s authorship rights, the user identification should also be included in the remarks. In addition, some other explanatory information can be included in the remark information.
In the embodiments of this specification, generally, for phrases or short sentences, the length should not exceed the preset length. For example, the preset length is "20 bytes". The original text that is too long may have become a literary work such as novels, poems, etc., and has entered the protection scope of copyright. In that case, the text that is too long is not suitable for originality verification by the scheme of the embodiment of this specification, nor is it suitable for passing through The evidence is provided in the method provided in the examples of this specification.
In addition, when constructing the target transaction on the client side, the user can also obtain the current time stamp through the time module through the user device. And when constructing the target transaction, the above time stamp is added to further play the role of auxiliary deposit.
S103: The node receives the target transaction, and performs originality verification on the original text.
Originality verification includes two aspects, namely, formal originality verification and semantic originality verification. If an original text is original in form, and it has exact semantics. Then, it can be considered that the original text is original. For example, for a phrase "Xidapuben", before a certain point in time, there is no word of the same form in itself, and at the same time, the exact semantics of itself are given in the remarks as "pleasant to hear, happy to see, happy to hear, Celebrate the whole world and walk together." Then at this time, the node can consider the phrase "Xida Puben" at this time to be original.
On the other hand, if an original text is not original in form, it already exists. Then, at this time, the semantics of the original text needs to be further verified. If the original text is semantically original and is not the same as the previous conventional semantics, then the original text can be considered as original.
S105: If the verification is passed, the node broadcasts the target transaction to the blockchain network, so that each node in the blockchain network performs consensus processing on the target transaction based on a consensus mechanism, and then After approval, the target transaction is published to the blockchain.
Since the original text and the remark information containing the user's logo are bundled and stored on the blockchain, it is difficult to be tampered with, and can be used as evidence of the user's original author. Each node in the blockchain network performs consensus processing on the target transaction based on the consensus mechanism, and after the consensus is passed, the target transaction is published to the confirmation blockchain, at this time a deposit certificate hash can be returned for use In addition, users can query the blockchain through the deposit hash to confirm the original identity.
The solution provided by the embodiment of this specification uses the user to issue transactions that include original text and remarks. After the blockchain verifies the originality of the original text, if the verification is passed, the originality of the original text is determined. Furthermore, the transaction containing the original text is carried out on the blockchain for consensus and evidence, so as to realize the evidence for the original works that cannot be protected by copyright, and protect the interests of the original author.
In a specific implementation, for step S103, the original text is verified for originality. When the node already contains more transaction content, the originality verification can be performed based on the content already stored in the blockchain . For each node in the blockchain, after the transaction completes the consensus (that is, the transaction has been determined to be on the chain), each transaction content (including original text and remarks) can be stored. Therefore, based on the original text in the transaction content that has been on the chain, and some conventional dictionaries (for example, ancient and modern Chinese dictionaries), an updatable database for originality verification can be constructed to verify the original text. If the original text meets originality in form (that is, there is no identical text in the database) and has exact semantics, the originality verification will pass.
In a specific implementation, since the original text is often created on the Internet, the original text can also be publicly searched, which specifically includes: searching the original text from the wide area network to obtain public information related to the original text Search content; continuously match the original text with the public search content, and determine the continuous matching degree of the string in the public search content with the original text; if the continuous matching degree is less than the matching threshold, The verification is passed.
Specifically, you can search the original text from the wide area network. For example, a search engine is used to search for original text, and multiple pieces of content corresponding to the original text are obtained. Since the original text can be regarded as a string, the search engine also performs corresponding searches based on the string corresponding to the original text. When the public search content fails to obtain the same string, that is, if there is no string with a continuous matching degree of 100%, the verification is passed.
When using a public search engine to search, you can also search based on the timestamp carried in the transaction. When the time stamp carried in the transaction is time point A, the searched public content should be before time point A, and should not contain relevant content after time point A. For example, content filtering can be performed through the time option provided by the search engine, and content search can be performed with time point A as the cutoff point.
In the embodiments of this specification, due to the short length of the original text, search engines can often obtain similar strings when they cannot obtain the same strings. Similar strings are often related to the same strings. At this time, a certain threshold condition can also be set for judgment, and the degree of continuous matching between similar strings and original text strings can be calculated. If it is less than a certain preset threshold, the verification is passed. The degree of continuous matching characterizes the degree of similarity between two strings. This degree of similarity includes the degree of similarity of characters and the degree of similarity of character sequence. For phrases, when the two are highly close, they are generally considered to be a sign With the same meaning, when the continuous matching degree is less than the critical value of the matching degree, it can be considered that the semantics of the two are obviously different, and the verification passes.
In the case where the content fragment obtained by the search engine contains a string similar to the original text, at this time, the similar string can be further semantically analyzed. Specifically, you can first determine the public search content that contains similar strings. Generally speaking, the public search content is a sentence or a paragraph of text that contains the same or similar string. The public search content can be the full text text obtained through the search link, part of the text fragment obtained through the search, or some snapshot text, etc. As shown in FIG. 2, FIG. 2 is a schematic diagram of public search content in the current technology. In this schematic diagram, the original text is replaced by the self-string "XXXX", the same string found in the search is "XXXX", and similar strings are "XXXY", "XXYX", etc., directly in the search engine The results given are generally partial text fragments containing the same or similar strings. The links in the diagram are replaced with ellipsis.
Furthermore, similar character strings can be semantically analyzed based on public search content and context. Generally speaking, the scope of the context does not need to be too broad, as the subtlety is consistent with the content of the public search. That is, when the public search content is a sentence, the context is one sentence before and after, and when the public search content is a paragraph, the context is one paragraph before and after. Thus, the second semantics of similar strings can be obtained. The first semantics of the original text can be analyzed from the remarks. Furthermore, the similarity between the second semantics and the first semantics can be compared. Obviously, when the two forms are already very similar, if the two semantics are still very similar, it is obviously not original. In this case Generally, the semantic similarity of the two is required to be low, and a smaller similarity threshold is set. When the semantic similarity of the two is less than the semantic similarity threshold (for example, 5%), the verification is passed.
Further, the semantic similarity threshold may be negatively related to the continuous matching degree of the two. When the degree of continuous matching between similar strings and original text is greater, the threshold of semantic similarity should be smaller. For example, the threshold of semantic similarity = 1-continuous matching degree. When the two forms are completely the same, the semantics of the string in the original text must be completely different from the semantics of the string in the public search content in order to pass verification.
Further, after each node in the blockchain network performs consensus processing on the target transaction based on the consensus mechanism, each node can also store the content included in the target transaction. The specific storage method can be that each node uses the original text as the main key, the remark information as the value, establishes the key-value correspondence between the original text and the remark information, and stores the key-value correspondence to the local pre-maintained data Library. In this way, on the one hand, the subsequent original text can be verified according to the above-mentioned database, avoiding the need to obtain transaction content from the blockchain when verification is required; on the other hand, it can be beneficial to third parties to conduct corresponding queries , So that you can easily learn about the creative background and original author of an original text.
In the second aspect of the embodiment of this specification, there is also provided a blockchain-based work storage method for nodes, as shown in FIG. 3, which is the blockchain-based method for nodes provided by the embodiment of this specification. Schematic diagram of the process of storage method of works, including:
S301. Receive a target transaction, where the target transaction contains original text and remarks information related to the original text, the original text is a phrase or short sentence not exceeding a preset length, and the remark information includes User identification and semantic information of the original text;
S303: Perform originality verification on the original text;
S305: If the verification is passed, the node broadcasts the target transaction to the blockchain network, so that each node in the blockchain network performs consensus processing on the target transaction based on the consensus mechanism, and then After approval, the target transaction is published to the blockchain.
Further, in step S303, the original verification of the original text includes: obtaining the transaction content that has been deposited from the blockchain, and verifying the original text based on the transaction content of the deposited certificate. The originality of the text is verified.
Further, in step S303, performing originality verification on the original text includes:
Search for the original text from the wide area network to obtain the public search content related to the original text; continuously match the original text with the public search content to determine that the string in the public search content matches the The continuous matching degree of the original text; if the continuous matching degree is less than the critical value of the matching degree, the verification is passed.
Furthermore, in step S303, performing originality verification on the original text includes: determining the first semantics of the original text from the remark information; determining the similarity whose continuous matching degree exceeds the matching degree threshold String; from the public search content containing the similar string, determine the second semantics of the similar string; if the similarity between the first semantics and the second semantics is less than the semantic similarity threshold, the verification is passed.
Further, after performing consensus processing on the target transaction based on the consensus mechanism, the method further includes: using the original text as the main key and the remark information as the value, establishing a key-value correspondence between the original text and the remark information , And store the key-value correspondence.
Corresponding to the first aspect, the embodiment of this specification also provides a blockchain-based work storage system, including:
The client sends a target transaction to the node, the target transaction contains original text and remarks information related to the original text, the original text is a phrase or short sentence not exceeding a preset length, and the remark information contains User identification and semantic information of the original text;
The node receives the target transaction and verifies the originality of the original text;
If the verification is passed, the node broadcasts the target transaction to the blockchain network so that each node in the blockchain network performs consensus processing on the target transaction based on the consensus mechanism, and after the consensus is passed Publish the target transaction to the blockchain.
Corresponding to the second aspect, the embodiment of this specification also provides a block chain-based work storage device, as shown in FIG. 4, which is a block chain-based work storage device provided by the embodiment of the specification Schematic diagram of the structure including:
The receiving module 401 receives a target transaction, wherein the target transaction includes original text and remark information related to the original text, the original text is a phrase or short sentence not exceeding a preset length, and the remark information Contains user identification and semantic information of the original text;
The verification module 403 performs originality verification on the original text;
The broadcast module 405, if the verification is passed, the node broadcasts the target transaction to the blockchain network, so that each node in the blockchain network performs consensus processing on the target transaction based on a consensus mechanism, And after the consensus is passed, the target transaction is released to the blockchain.
Further, the verification module 403 obtains the transaction content that has been deposited from the blockchain, and performs original verification on the original text based on the transaction content of the deposited certificate.
Further, the verification module 403 searches for the original text from a wide area network to obtain public search content related to the original text; continuously matches the original text with the public search content to determine the The degree of continuous matching between the string in the public search content and the original text; if the degree of continuous matching is less than the critical value of the matching degree, the verification is passed.
Furthermore, the verification module 403 determines the first semantics of the original text from the remarks information; determines the similar character strings whose continuous matching degree exceeds the critical value of the matching degree; from the similar character strings containing the similar character strings In the public search content, the second semantics of the similar string is determined; if the similarity between the first semantic and the second semantic is less than the threshold of semantic similarity, the verification is passed.
Further, the device further includes a storage module 407, which uses the original text as the main key and the remark information as the value, establishes a key-value correspondence between the original text and the remark information, and stores the key-value correspondence.
The embodiment of this specification also provides a computer device, which at least includes a memory, a processor, and a computer program stored on the memory and capable of running on the processor, wherein the processor executes the program as shown in FIG. 3 A method for depositing works based on blockchain.
Figure 5 shows a more specific hardware structure diagram of a computing device provided by an embodiment of this specification. The device may include: a processor 1010, a memory 1020, an input/output interface 1030, a communication interface 1040, and a bus 1050 . The processor 1010, the memory 1020, the input/output interface 1030 and the communication interface 1040 realize the communication connection between each other in the device through the bus 1050.
The processor 1010 may be implemented by a general CPU (Central Processing Unit, central processing unit), a microprocessor, an application specific integrated circuit (Application Specific Integrated Circuit, ASIC), or one or more integrated circuits, etc., for Execute related programs to realize the technical solutions provided in the embodiments of this specification.
The memory 1020 can be implemented in the form of ROM (Read Only Memory), RAM (Random Access Memory), static storage device, dynamic storage device, etc. The memory 1020 can store the operating system and other application programs. When the technical solutions provided in the embodiments of this specification are implemented through software or firmware, the related program codes are stored in the memory 1020 and executed by the processor 1010. .
The input/output interface 1030 is used for connecting input/output modules to realize information input and output. The input/output/module can be configured in the device as a component (not shown in the figure), or can be connected to the device to provide corresponding functions. The input device may include a keyboard, a mouse, a touch screen, a microphone, various sensors, etc., and an output device may include a display, a speaker, a vibrator, an indicator light, and so on.
The communication interface 1040 is used to connect a communication module (not shown in the figure) to realize the communication interaction between the device and other devices. The communication module can realize communication through wired means (such as USB, cable, etc.), or through wireless means (such as mobile network, WIFI, Bluetooth, etc.).
The bus 1050 includes a path for transmitting information between various components of the device (such as the processor 1010, the memory 1020, the input/output interface 1030, and the communication interface 1040).
It should be noted that although the above device only shows the processor 1010, the memory 1020, the input/output interface 1030, the communication interface 1040, and the bus 1050, in the specific implementation process, the device may also include a device for normal operation. Other required components. In addition, those skilled in the art can understand that the above-mentioned device may also include only the components necessary to implement the solutions of the embodiments of the present specification, rather than all the components shown in the figures.
The embodiment of the present specification also provides a computer-readable storage medium on which a computer program is stored. When the program is executed by a processor, the method for depositing works based on the blockchain shown in FIG. 3 is realized.
Computer-readable media include permanent and non-permanent, mobile-removable and non-mobile-removable media, and information storage can be realized by any method or technology. Information can be computer-readable instructions, data structures, program modules, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), and other types of random access memory (RAM) , Read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), flash memory or other internal memory technology, read-only CD-ROM, digital multi-function Optical discs (DVD) or other optical storage, magnetic cassettes, magnetic tape storage or other magnetic storage devices, or any other non-transmission media, can be used to store information that can be accessed by computing devices. According to the definition in this article, computer-readable media does not include transitory media, such as modulated data signals and carrier waves.
From the description of the above embodiments, those skilled in the art can clearly understand that the embodiments of this specification can be implemented by means of software plus a necessary general hardware platform. Based on this understanding, the technical solutions of the embodiments of this specification can be embodied in the form of software products, which can be stored in storage media, such as ROM/RAM, magnetic A disc, an optical disc, etc., include a number of instructions to make a computer device (which can be a personal computer, a server, or a network device, etc.) execute the methods described in the various embodiments or some parts of the embodiments of this specification.
The systems, methods, modules, or units explained in the above embodiments may be implemented by computer chips or entities, or implemented by products with certain functions. A typical implementation device is a computer. The specific form of the computer can be a personal computer, a laptop computer, a cellular phone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email receiving and sending device, and a game. Host, tablet, wearable device, or a combination of any of these devices.
The various embodiments in this specification are described in a progressive manner, and the same or similar parts between the various embodiments can be referred to each other, and each embodiment focuses on the differences from other embodiments. In particular, as for the method embodiment, since it is basically similar to the method embodiment, the description is relatively simple, and the relevant part can refer to the part of the description of the method embodiment. The method embodiments described above are merely illustrative. The modules described as separate components may or may not be physically separated. When implementing the solutions of the embodiments of this specification, the functions of the modules can be Implemented in the same one or more software and/or hardware. It is also possible to select some or all of the modules according to actual needs to achieve the objectives of the solutions of the embodiments. Those of ordinary skill in the art can understand and implement it without creative work.
The above are only specific implementations of the embodiments of this specification. It should be pointed out that for those of ordinary skill in the art, without departing from the principle of the embodiments of this specification, several improvements and modifications can be made. These Improvements and modifications should also be regarded as the protection scope of the embodiments of this specification.